Analysis
-
max time kernel
155s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe
Resource
win10v2004-20221111-en
General
-
Target
afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe
-
Size
480KB
-
MD5
1db5f2c2b826078e1c06c88d87b37897
-
SHA1
e969f8927d8865dc4e63ee5606e262aa54d88dd2
-
SHA256
afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3
-
SHA512
cbffba4fd768e4395131746928b84d68bdc98c5bb67af436c6f2bdb4fe86cf4cdd3c689b912dfdb9494e0f0365b3a9b04e5538f3b789ae5939dec0aa23b97ad0
-
SSDEEP
12288:g6PKnK6qcqbeGq4NQlq5AY5gAtK0P6+0Ehl:iBHKQlWVr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe -
Executes dropped EXE 3 IoCs
pid Process 4184 csrss.exe 2976 csrss.exe 3880 csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4308 netsh.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe File opened for modification \??\PhysicalDrive0 csrss.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3456 set thread context of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3668 set thread context of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 4184 set thread context of 2976 4184 csrss.exe 89 PID 2976 set thread context of 3880 2976 csrss.exe 90 -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 4184 csrss.exe 2976 csrss.exe 3880 csrss.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3456 wrote to memory of 3668 3456 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 84 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 3668 wrote to memory of 1860 3668 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 85 PID 1860 wrote to memory of 4308 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 86 PID 1860 wrote to memory of 4308 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 86 PID 1860 wrote to memory of 4308 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 86 PID 1860 wrote to memory of 4184 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 88 PID 1860 wrote to memory of 4184 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 88 PID 1860 wrote to memory of 4184 1860 afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe 88 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 4184 wrote to memory of 2976 4184 csrss.exe 89 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90 PID 2976 wrote to memory of 3880 2976 csrss.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe"C:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe"C:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe"C:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Nero" dir=in action=allow description="Multimedia suite" program="C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4308
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exeC:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exeC:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exeC:\Users\Admin\AppData\Local\Temp\afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD51db5f2c2b826078e1c06c88d87b37897
SHA1e969f8927d8865dc4e63ee5606e262aa54d88dd2
SHA256afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3
SHA512cbffba4fd768e4395131746928b84d68bdc98c5bb67af436c6f2bdb4fe86cf4cdd3c689b912dfdb9494e0f0365b3a9b04e5538f3b789ae5939dec0aa23b97ad0
-
Filesize
480KB
MD51db5f2c2b826078e1c06c88d87b37897
SHA1e969f8927d8865dc4e63ee5606e262aa54d88dd2
SHA256afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3
SHA512cbffba4fd768e4395131746928b84d68bdc98c5bb67af436c6f2bdb4fe86cf4cdd3c689b912dfdb9494e0f0365b3a9b04e5538f3b789ae5939dec0aa23b97ad0
-
Filesize
480KB
MD51db5f2c2b826078e1c06c88d87b37897
SHA1e969f8927d8865dc4e63ee5606e262aa54d88dd2
SHA256afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3
SHA512cbffba4fd768e4395131746928b84d68bdc98c5bb67af436c6f2bdb4fe86cf4cdd3c689b912dfdb9494e0f0365b3a9b04e5538f3b789ae5939dec0aa23b97ad0
-
Filesize
480KB
MD51db5f2c2b826078e1c06c88d87b37897
SHA1e969f8927d8865dc4e63ee5606e262aa54d88dd2
SHA256afd2e8d0570b07bddbf2ce69a9ca3f1bdc53f885036eed8a6867bb6107aa70c3
SHA512cbffba4fd768e4395131746928b84d68bdc98c5bb67af436c6f2bdb4fe86cf4cdd3c689b912dfdb9494e0f0365b3a9b04e5538f3b789ae5939dec0aa23b97ad0